US20130066785A1 - Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System - Google Patents

Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System Download PDF

Info

Publication number
US20130066785A1
US20130066785A1 US13/612,766 US201213612766A US2013066785A1 US 20130066785 A1 US20130066785 A1 US 20130066785A1 US 201213612766 A US201213612766 A US 201213612766A US 2013066785 A1 US2013066785 A1 US 2013066785A1
Authority
US
United States
Prior art keywords
content
storage structure
media storage
key
encrypted content
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
US13/612,766
Other versions
US10296879B2 (en
Inventor
Augustin J. Farrugia
Thomas Dowdy
Gianpaolo Fasoli
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to US13/612,766 priority Critical patent/US10296879B2/en
Publication of US20130066785A1 publication Critical patent/US20130066785A1/en
Priority to US16/417,470 priority patent/US11727376B2/en
Application granted granted Critical
Publication of US10296879B2 publication Critical patent/US10296879B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/10Protecting distributed programs or content, e.g. vending or licensing of copyrighted material ; Digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • G06Q2220/12Usage or charge determination

Definitions

  • the present invention relates to the use of a single media storage structure with multiple pieces of content in a digital rights management system.
  • DRM Digital Rights Management
  • Cryptography is the traditional method of protecting data in transit across a network. In its typical application, cryptography protects communications between two mutually trusting parties from an attack on the data in transit.
  • the paradigm has shifted, as a party that receives the content (i.e., the “receiving party”) might try to break the DRM encryption that the party that supplied the content (i.e., the “distributing party”) applied to the content.
  • a third party may obtain access to the receiving party's computer and thus to the protected content.
  • Existing DRM system often do not allow content recipients to flexibly purchase or license a subset of the contents from a related set of DRM contents.
  • one existing DRM system distributes certain songs along with their associated music videos. In distributing a song along with its associated music video, this DRM system rigidly requires a recipient either (1) to purchase both the song and its associated music video, or (2) to forego access to both the song and its associated music video. Therefore, there is a need in the art for a DRM system that flexibly allows content recipients to purchase or license a subset of the content from a related set of DRM contents.
  • Some embodiments of the invention provide a method for distributing content over a network.
  • the method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to the network.
  • the media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access.
  • the provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece. Based on the provided set of keys, the device can then decrypt and access either one of the two pieces of content in the media storage structure or both pieces of encrypted content in the media storage structure.
  • the media storage structure includes a first content section that stores the first piece of encrypted content, and a second content section that stores the second piece of encrypted content.
  • the media storage structure also includes first and second key sections respectively for storing first and second keys for decrypting the first and second pieces of encrypted content.
  • the method of some embodiments distributes the media storage structure with the encrypted first and second content pieces from a computer that is separate from the computer or computers that distribute the first and second keys.
  • the device that receives the media storage structure inserts the first and second keys in the first and second key sections of the media storage structure.
  • One piece of encrypted content might be audio content (e.g., an audio track, a song, a sound track, etc.) related to a particular presentation (e.g., a music video, a film, etc.), while the other piece of encrypted content might be video content (e.g., a video track, a video clip, etc.) related to the particular presentation.
  • both pieces of content can be video content (e.g., video clips from different angles of one or more scenes) or audio content (e.g., different versions or mixes of a song or different languages for the dialogue in a movie).
  • content other than audio or video might be stored in the media storage structure.
  • one piece of content might be audio or video content, while the other piece of content might be lyrics or dialogue associate with the audio or video content piece.
  • the method in some embodiments distributes a media storage structure that contains more than two pieces of content.
  • the media storage structure includes one piece of audio content and two pieces of video content, which can be two different video clips associated with the audio content (e.g., can be two different music videos that are associated with a song).
  • the device e.g., the computer
  • the device that receives the media storage structure transfers the media storage structure to another device (e.g., to a portable player).
  • another device e.g., to a portable player
  • one of the pieces of content from the media storage structure might be removed in the transfer of the media storage structure to the other device (e.g., in the portable player).
  • content is removed from the media storage structure in order to reduce the consumption of resources on the other device.
  • content is removed from the media storage structure because the other device does not have rights to access this other content.
  • FIG. 1 illustrates an example of such a media storage structure.
  • FIG. 2 illustrates an example where the selected set of keys includes a first key for decrypting the first encrypted piece of content and a second key for decrypting the second encrypted piece of content.
  • FIG. 3 illustrates another example of the media storage structure.
  • FIGS. 4-10 illustrate various examples of related pieces of content in a media storage structure of some embodiments.
  • FIG. 11 illustrates a content-distribution system of some embodiments.
  • FIG. 12 conceptually illustrates an example of one possible set of interactions between the computer, the DRM server, and the content-caching server.
  • FIG. 13 illustrates another example of a computer acquiring a media file.
  • FIG. 14 illustrates a computer's storage of the two keys that it receives in the example illustrated in FIG. 11 .
  • FIG. 15 illustrates a computer's storage of the key that it receives in the example illustrated in FIG. 13 .
  • FIG. 16 illustrates an example of the computer synchronizing its DRM content with a portable player.
  • FIG. 17 conceptually illustrates a process that a computer performs in some embodiments to synchronize a set of content with a portable player.
  • Some embodiments of the invention provide a content-distribution system for distributing unitary media storage structures to devices (e.g., computers, portable players, etc.) that connect to a network.
  • Each unitary media storage structure includes a set of related pieces of content.
  • each piece of content is separately encrypted to protect it from unauthorized use. Examples of pieces of content include video, audio, text, sound, etc.
  • FIG. 1 conceptually illustrates an example of a unitary media storage structure 100 of some embodiments.
  • the media storage structure includes first and second pieces 105 and 110 of encrypted content. It also includes first and second sections 115 and 120 for containing first and second cryptographic keys for decrypting the first and second pieces 105 and 110 of content.
  • the media storage structure also includes a header 125 that includes metadata regarding the content in the media storage structure.
  • the system Based on whether the device is allowed to access the first piece of content 105 , the second piece of content 110 , or both, the system provides the device with a set of keys for decrypting the pieces of the content that the device is able to access.
  • the provided set of keys might include only one key for decrypting only one of the two encrypted pieces of content. Alternatively, it might include two keys for decrypting both encrypted pieces of content.
  • FIG. 2 illustrates an example where the selected set of keys includes a first key 215 for decrypting the first encrypted piece of content 105 and a second key 220 for decrypting the second encrypted piece of content 110 .
  • FIG. 3 illustrates another example of the media storage structure 100 .
  • the media storage structure 100 includes only the second key 220 for decrypting the second piece of encrypted content 110 .
  • the device can decrypt and access either one of the two pieces of content 105 and 110 or both pieces of encrypted content.
  • the system of some embodiments distributes the media storage structure with the encrypted first and second content pieces 105 and 110 from a computer that is separate from the computer or computers that distribute the first and second keys 215 and 220 for decrypting the first and second pieces of encrypted content.
  • the single media storage structure that is distributed by some embodiments includes a set of related pieces of content.
  • two pieces of content are related when they relate to the same audio and/or video presentation (e.g., song, movie, music video, etc.).
  • two pieces of related content can be viewed or played simultaneously.
  • two pieces of related content can be viewed or player independently.
  • FIGS. 4-10 illustrate various examples of related pieces of content in a media storage structure of some embodiments.
  • FIG. 4 illustrates an example of a storage structure 400 where one piece of encrypted content is audio content 405 (e.g., an audio track, a song, a sound track) related to a particular presentation (e.g., a music video, a film, etc.), while the other piece of encrypted content is video content 410 (e.g., a video track, a video clip, etc.) related to the particular presentation.
  • audio content 405 e.g., an audio track, a song, a sound track
  • video content 410 e.g., a video track, a video clip, etc.
  • FIG. 5 illustrates a storage structure 500 that includes two pieces of video content.
  • One example of two such pieces of video content would be two video clips that are shot from different angles to cover one or more scenes in a movie.
  • a piece of video content might also include audio content associated with its video content or might only include video data.
  • FIG. 6 illustrates a storage structure 600 that includes two pieces of audio content.
  • One example of two such pieces of audio content would be two different versions or mixes of a song.
  • FIG. 7 illustrates a media storage structure 700 that stores one piece of audio content 705 and another piece of textual content 710 , which might be lyrics, dialogue, or other data associated with the audio content 705 .
  • FIG. 8 illustrates a media storage structure 800 that stores one piece of video content 805 and another piece of textual content 810 , which might be dialogue associate with the video content 805 .
  • the system distributes a media storage structure that contains more than two pieces of content.
  • FIG. 9 illustrates a media storage structure 900 that includes one piece of audio content (e.g., a song) along with two pieces of video content, which can be two different video clips associated with the audio content (e.g., can be two different music videos that are associated with the song).
  • FIG. 10 illustrates a media storage structure 1000 that includes one piece of video content (e.g., a movie) along with two pieces of audio content, which can be the video's audio component in two different languages.
  • the media storage structure includes a key for decrypting each piece of content stored in the media storage structure.
  • the content-distribution system of some embodiments allows different set of keys to be acquired (e.g., purchased or licensed) for accessing a media storage structure on a particular device.
  • the device stores the acquired set of keys in the media storage structure, and uses the acquired set of keys to decrypt and access the media storage structure's content that has been purchased or licensed for access on the device. Once decrypted, the device can individually or simultaneously view or play the decrypted pieces of content.
  • the device e.g., the computer
  • the device that receives the media storage structure transfers the media storage structure to another device (e.g., to a portable player).
  • another device e.g., to a portable player
  • one of the pieces of content from the media storage structure might be removed in the transfer of the media storage structure to the other device (e.g., in the portable player).
  • one of the pieces of content is removed in order to reduce the consumption of resources on the other device.
  • Some embodiments above were illustrated by reference to a media storage structure that itself includes a plurality of sections available for storage of keys. Such storage sections can be incorporated into many media file formats, including the Quicktime file format, Windows Media file format, Real media format, ISO/IEC 14496-12, Motion JPEG, etc.
  • Such storage sections can be incorporated into many media file formats, including the Quicktime file format, Windows Media file format, Real media format, ISO/IEC 14496-12, Motion JPEG, etc.
  • the keys are alternatively stored and transferred separately from the unitary media files to which they pertain.
  • FIG. 11 illustrates a content-distribution system 1100 of some embodiments.
  • This content-distribution system distributes content in a manner that protects the digital rights (i.e., ensures the legal use) of the content.
  • the system distributes single media storage structures with multiple related pieces of content.
  • the media storage structures are media files.
  • One of ordinary skill will realize that other embodiments might use other types of storage structures.
  • the content-distribution system 1100 includes a content-caching server 1105 , a DRM server 1110 , and a content-receiving computer 1115 .
  • the computer 1115 connects to the servers 1105 and 1110 through a computer network, such as a local area network, a wide area network, a network of networks (e.g., the Internet), etc.
  • the computer 1115 communicates with the DRM server 1110 to obtain content.
  • the content-distribution system 1100 does not entail the sale or licensing of content. Accordingly, in these embodiments, the DRM server 1110 simply enforces the distribution of content to authorized computers without considering any financial objectives.
  • the DRM server 1110 is the server from which the user of the computer 1115 can purchase or license content.
  • the DRM server 1110 of some embodiments is the server that handles the financial transaction for purchasing or licensing content. In some instance, certain content can be purchased or licensed free.
  • the content-distribution system 1100 uses the content caching server 1105 to provide a media storage file that contains one or more pieces of DRM content to the computer 1115 through the network 1120 .
  • the system 1100 uses multiple caching servers 1105 to cache content at various locations on the network, in order to improve the speed and efficiency of downloading content across the network.
  • the DRM server 1110 For each media storage file that the DRM server 1110 directs the caching server 1105 to provide to the computer 1115 , the DRM server 1110 provides a set of keys for the computer to use to decrypt the content that is stored in the media storage file.
  • FIG. 12 conceptually illustrates an example of one possible set of interactions between the computer 1115 , the DRM server 1110 , and the content-caching server 1105 .
  • This set of interactions represents a content-acquisition process 1200 of some embodiments of the invention.
  • the acquisition process 1200 starts when the computer 1115 sends (at 1205 ) a request to the DRM server 1110 to purchase or license one or more pieces of content that are stored in a particular media file.
  • the DRM server receives this request.
  • the acquisition process then has the DRM server 1110 and/or purchasing computer 1115 perform one or more operations (at 1215 ) to complete the purchase or license transaction.
  • the DRM server 1110 sends (at 1215 ) a request to the content-caching server 1105 to send the media file for the purchased or licensed content to the computer 1115 .
  • the caching server 1105 receives this request at 1225 , and in response, commences (at 1230 ) a download of the media file to the purchasing computer 1115 .
  • FIG. 11 illustrates an example of a media file 1125 that the content caching server 1105 downloads to the computer 1115 .
  • the media file has five sections.
  • the first and second section 1145 and 1155 contain two pieces of encrypted content. Each piece of content is encrypted using a particular content key.
  • the third and fourth sections 1150 and 1160 are empty sections in the file for the insertion of the content keys if such content keys are purchased or licensed by the computer 1115 .
  • the fifth section 1165 is a header field, which contains metadata regarding the content and/or content keys.
  • the computer 1115 receives (at 1235 ) the media file provided by the caching server.
  • the computer 1115 then sends (at 1240 ) a confirmation of the download to the DRM server 1110 .
  • the DRM server 1110 transitions to a wait state 1245 to wait for the confirmation to be received from the computer 1115 .
  • the DRM server 1110 receives the confirmation of the download at 1245 , it sends (at 1250 ) to the computer 1115 a set of keys based on the pieces of content that the computer 1115 purchased or licensed.
  • the computer 1115 has acquired both pieces of content that is stored in the media file. Accordingly, in this example, the DRM server 1110 sends (at 1250 ) a set of keys that would allow the computer 1115 to access both pieces of content in the media file 1125 .
  • this set of keys includes two content keys 1130 and 1132 .
  • each piece of content e.g., 1145 or 1155
  • a particular content key e.g., 1130 or 1132 .
  • the computer 1115 uses the content key 1130 to decrypt the encrypted content 1145 , and uses the content key 1132 to decrypt the encrypted content 1155 .
  • FIG. 13 illustrates another example of the computer 1115 acquiring the media file 1125 .
  • the computer 1115 has only acquired the first encrypted content 1145 . Accordingly, even though the caching server 1105 supplies the computer 1115 with the media file that contains both pieces of content, the DRM server 1110 only supplies the content key 1130 for the encrypted content 1145 .
  • the computer can access the encrypted content 1145 in the media file by using the content key 1130 .
  • the computer 1115 since the computer 1115 has not received the encrypted content for the encrypted content 1155 in the media file 1125 , the computer cannot decrypt the encrypted content 1155 .
  • the computer 1115 receives (at 1255 ) the set of keys supplied by the DRM server 1110 . As shown in FIG. 12 , the computer 1115 stores (at 1260 ) this set of keys in the media file.
  • FIG. 14 illustrates the computer's storage of the two keys that it receives in the example illustrated in FIG. 11 . As shown in this figure, the computer 1115 initially stores the content keys 1130 and 1132 in temporary storages 1405 and 1407 . It then merges these content keys with the media file 1125 that it received at 1235 and that it temporarily stored in a temporary storage 1410 . The computer then stores the media file that results from this merging in a content library storage 1415 .
  • FIG. 15 illustrates the computer's storage of the key that it receives in the example illustrated in FIG. 13 .
  • the storage operation illustrated in FIG. 15 is similar to the storage operation illustrated in FIG. 14 , except that the merge file (stored in the content media library 1415 ) does not contain the content key 1132 for the second encrypted content as the computer did not acquire and receive this content key.
  • the content-distribution system 1100 utilizes one computer to provide the encrypted content while using another computer to provide the keys necessary for decrypting the encrypted content.
  • the content-distribution system utilizes one computer to provide encrypted content and the keys for decrypting the encrypted content.
  • the content-distribution system uses more than one computer to provide the cryptographic keys for the content.
  • keys for audio content may be available from one server and keys for related video content stored in the same media storage structure may be available from a separate server.
  • the multiple servers may even be owned and administered by different parties, as may be the rights they administer.
  • the content-distribution system 1100 provides different cryptographic keys for decrypting different pieces of content.
  • the content-distribution system might utilize different encoding schemes for encrypting different pieces of content. For instance, the system might utilize a symmetric encoding scheme to encrypt audio content but utilize an asymmetric encrypting scheme to encrypt video content. Alternatively, the system might encrypt audio content in its entirety, while encrypting only parts of the video content.
  • FIG. 12 illustrates one possible set of interactions between the computer 1115 , the DRM server 1110 , and the caching server 1105 .
  • the computer 1115 does not send a confirmation of the receipt of a media file to the DRM server.
  • the DRM server on its own sends the set of keys to the computer 1115 .
  • the DRM server is shown as a single computer, but for the purposes of this patent, such a server could include many interconnected computers and/or memory and/or interconnecting pieces of equipment.
  • the content caching server could be a single computer or a collection of networked computers and memory all forming a server.
  • content may be supplied from a content caching server directly or indirectly to a specific client computer, other transfer methods may result in a computer requiring keys to unlock content available to it from a peer computer, portable storage device, or some other transfer mechanism.
  • the computer 1115 can synchronizes its DRM content with a portable player that is also allowed access to the DRM content. In some cases, this synchronization removes one or more pieces of content from a media file that the computer downloads to the portable player. In some cases, the pieces of content are removed in order to reduce the consumption of resources on the other device. In other cases, content is removed from the media storage structure because the other device does not have rights to access this other content.
  • FIG. 16 illustrates an example of the computer 1115 synchronize its DRM content with a portable player 1605 .
  • the portable player can be a music player, audio/video player, etc.
  • the portable player 1605 in some embodiments receives (1) DRM content from the computer 1115 , and (2) a content key for decrypting each piece of DRM content that it receives. The portable then stores the received encrypted DRM content and the associated keys.
  • FIG. 17 conceptually illustrates a process 1700 that a computer 1115 performs in some embodiments to synchronize a set of content with a player 1605 .
  • the process 1700 starts (at 1705 ) when it receives a request to synchronize a set of content with the player 1605 .
  • the process then identifies (at 1710 ) the set of media files that is associated with a user account ID of the player.
  • the process determines (at 1715 ) whether the computer 1115 is storing any media file for the player, which it has not yet downloaded to the player (i.e., whether there is any media file that needs to be synchronized between the computer and the player). If not, the process ends.
  • the process selects (at 1720 ) a media file that needs to be synchronized.
  • the process removes from the media file any piece of content that has been designated as content that should not be downloaded to the portable player.
  • the computer uses an application that allows a user to designate the content that the user wishes to synchronize with the portable player.
  • FIG. 16 illustrates an example of the removal of the video content and its associated content key from a media file 1600 that is downloaded to the portable player 1605 .
  • the process downloads (at 1725 ) the media file that contains only the encrypted content that has to be synchronized with the player (i.e., downloads the media file after any content that should not be downloaded to the player has been removed).
  • the downloaded media file not only contains one or more pieces of encrypted content but also contains one or more content keys that can be used to decrypt the content.
  • the set of keys that is downloaded in the media file to the player is the same set of keys that are used to decrypt the content on the computer 1115 .
  • the keys in the downloaded media file are a different set of keys.
  • the player then stores (at 1725 ) the downloaded media file on its internal storage (e.g., its internal non-volatile storage, hard drive, flash memory, etc.).
  • the process determines (at 1730 ) whether there is any additional content for the player that it has not yet downloaded to the player (i.e., whether there is any additional content that needs to be synchronized between the computer and the player). If so, the process repeats 1720 and 1725 for a piece of content that needs to be synchronized. If not, the process ends.
  • FIG. 17 provides an illustrative example of synchronizing media files between a computer and a player in some embodiments of the invention.
  • One of ordinary skill will realize that other embodiments use other processes for synchronizing media files.
  • the portable player directly communicates with the DRM server and/or the content caching server to obtain content.
  • DRM processes and systems for distributing content. These processes and systems encrypt and decrypt content based on cryptographic keys. Encrypting content entails transforming the content from a decipherable form (called plaintext) into an indecipherable form (called ciphertext) based on one or more cryptographic keys. Decrypting content entails transforming encrypted content into a decipherable from by using one or more cryptographic keys.
  • plaintext a decipherable form
  • ciphertext indecipherable form
  • Decrypting content entails transforming encrypted content into a decipherable from by using one or more cryptographic keys.
  • An encryption key is a piece of information that controls the operation of a cryptography algorithm.
  • the key that is used to encrypt content is the same key that is used to decrypt content.
  • the same key is not used to encrypt and decrypt the content. For instance, in one scheme, an encrypting device uses a public key of a recipient to encrypt content, and the recipient uses its private key to decrypt the encrypted content.
  • the encryption is applied to a binary format of the content.
  • the unencrypted binary format of a piece of content may be hard for a human to decipher, it can be deciphered by an application—or an operating system.
  • encrypted binary format of a piece of content ideally should not be deciphered by any application or operating system, without first being decrypted by using one or more cryptographic keys.

Abstract

A method for distributing content. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.). The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece.

Description

    FIELD OF THE INVENTION
  • The present invention relates to the use of a single media storage structure with multiple pieces of content in a digital rights management system.
  • BACKGROUND OF THE INVENTION
  • The protection of digital content transferred between computers over a network is fundamentally important for many enterprises today. Enterprises attempt to secure this protection by implementing some form of Digital Rights Management (DRM) process. The DRM process often involves encrypting the piece of content (e.g., encrypting the binary form of the content) to restrict usage to those who have been granted a right to the content.
  • Cryptography is the traditional method of protecting data in transit across a network. In its typical application, cryptography protects communications between two mutually trusting parties from an attack on the data in transit. However, for many digital file transfer applications today (e.g., for the transfer of audio or video content), the paradigm has shifted, as a party that receives the content (i.e., the “receiving party”) might try to break the DRM encryption that the party that supplied the content (i.e., the “distributing party”) applied to the content. In addition, with the proliferation of network penetration attacks, a third party may obtain access to the receiving party's computer and thus to the protected content.
  • Some pieces of content that are distributed in existing DRM systems are related to one another. However, existing DRM system often do not allow content recipients to flexibly purchase or license a subset of the contents from a related set of DRM contents. For instance, one existing DRM system distributes certain songs along with their associated music videos. In distributing a song along with its associated music video, this DRM system rigidly requires a recipient either (1) to purchase both the song and its associated music video, or (2) to forego access to both the song and its associated music video. Therefore, there is a need in the art for a DRM system that flexibly allows content recipients to purchase or license a subset of the content from a related set of DRM contents.
  • SUMMARY OF THE INVENTION
  • Some embodiments of the invention provide a method for distributing content over a network. The method distributes a single media storage structure to a device (e.g., a computer, portable player, etc.) that connects to the network. The media storage structure includes first and second pieces of encrypted content. Based on whether the device is allowed to access the first piece of content, the second piece of content, or both, the method provides the device with a set of keys for decrypting the pieces of the content that the device is able to access.
  • The provided set of keys might include one or more keys for decrypting only one of the two encrypted pieces of content. Alternatively, it might include one or more keys for decrypting both encrypted pieces of content. For instance, the selected set of keys might include a first key for decrypting the first encrypted piece and a second key for decrypting the second encrypted piece. Based on the provided set of keys, the device can then decrypt and access either one of the two pieces of content in the media storage structure or both pieces of encrypted content in the media storage structure.
  • The media storage structure includes a first content section that stores the first piece of encrypted content, and a second content section that stores the second piece of encrypted content. In some embodiments, the media storage structure also includes first and second key sections respectively for storing first and second keys for decrypting the first and second pieces of encrypted content. The method of some embodiments distributes the media storage structure with the encrypted first and second content pieces from a computer that is separate from the computer or computers that distribute the first and second keys. In some embodiments, the device that receives the media storage structure inserts the first and second keys in the first and second key sections of the media storage structure.
  • One piece of encrypted content might be audio content (e.g., an audio track, a song, a sound track, etc.) related to a particular presentation (e.g., a music video, a film, etc.), while the other piece of encrypted content might be video content (e.g., a video track, a video clip, etc.) related to the particular presentation. Alternatively, both pieces of content can be video content (e.g., video clips from different angles of one or more scenes) or audio content (e.g., different versions or mixes of a song or different languages for the dialogue in a movie). In addition, content other than audio or video might be stored in the media storage structure. For instance, one piece of content might be audio or video content, while the other piece of content might be lyrics or dialogue associate with the audio or video content piece.
  • The method in some embodiments distributes a media storage structure that contains more than two pieces of content. For instance, in some cases, the media storage structure includes one piece of audio content and two pieces of video content, which can be two different video clips associated with the audio content (e.g., can be two different music videos that are associated with a song).
  • In some embodiments, the device (e.g., the computer) that receives the media storage structure transfers the media storage structure to another device (e.g., to a portable player). In this transfer, one of the pieces of content from the media storage structure might be removed in the transfer of the media storage structure to the other device (e.g., in the portable player). In some cases, content is removed from the media storage structure in order to reduce the consumption of resources on the other device. In other cases, content is removed from the media storage structure because the other device does not have rights to access this other content.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • The novel features of the invention are set forth in the appended claims. However, for purpose of explanation, several embodiments are set forth in the following figures.
  • FIG. 1 illustrates an example of such a media storage structure.
  • FIG. 2 illustrates an example where the selected set of keys includes a first key for decrypting the first encrypted piece of content and a second key for decrypting the second encrypted piece of content.
  • FIG. 3 illustrates another example of the media storage structure.
  • FIGS. 4-10 illustrate various examples of related pieces of content in a media storage structure of some embodiments.
  • FIG. 11 illustrates a content-distribution system of some embodiments.
  • FIG. 12 conceptually illustrates an example of one possible set of interactions between the computer, the DRM server, and the content-caching server.
  • FIG. 13 illustrates another example of a computer acquiring a media file.
  • FIG. 14 illustrates a computer's storage of the two keys that it receives in the example illustrated in FIG. 11.
  • FIG. 15 illustrates a computer's storage of the key that it receives in the example illustrated in FIG. 13.
  • FIG. 16 illustrates an example of the computer synchronizing its DRM content with a portable player.
  • FIG. 17 conceptually illustrates a process that a computer performs in some embodiments to synchronize a set of content with a portable player.
  • DETAILED DESCRIPTION OF THE INVENTION
  • In the following description, numerous details are set forth for the purpose of explanation. However, one of ordinary skill in the art will realize that the invention may be practiced without the use of these specific details. In other instances, well-known structures and devices are shown in block diagram form in order not to obscure the description of the invention with unnecessary detail.
  • I. Media Storage Structure
  • Some embodiments of the invention provide a content-distribution system for distributing unitary media storage structures to devices (e.g., computers, portable players, etc.) that connect to a network. Each unitary media storage structure includes a set of related pieces of content. In at least some unitary media storage structures of some embodiments, each piece of content is separately encrypted to protect it from unauthorized use. Examples of pieces of content include video, audio, text, sound, etc.
  • FIG. 1 conceptually illustrates an example of a unitary media storage structure 100 of some embodiments. As shown in this figure, the media storage structure includes first and second pieces 105 and 110 of encrypted content. It also includes first and second sections 115 and 120 for containing first and second cryptographic keys for decrypting the first and second pieces 105 and 110 of content. The media storage structure also includes a header 125 that includes metadata regarding the content in the media storage structure.
  • Based on whether the device is allowed to access the first piece of content 105, the second piece of content 110, or both, the system provides the device with a set of keys for decrypting the pieces of the content that the device is able to access. The provided set of keys might include only one key for decrypting only one of the two encrypted pieces of content. Alternatively, it might include two keys for decrypting both encrypted pieces of content.
  • For instance, FIG. 2 illustrates an example where the selected set of keys includes a first key 215 for decrypting the first encrypted piece of content 105 and a second key 220 for decrypting the second encrypted piece of content 110. FIG. 3 illustrates another example of the media storage structure 100. In this example, the media storage structure 100 includes only the second key 220 for decrypting the second piece of encrypted content 110.
  • Based on the set of keys that the system provides to the device, the device can decrypt and access either one of the two pieces of content 105 and 110 or both pieces of encrypted content. The system of some embodiments distributes the media storage structure with the encrypted first and second content pieces 105 and 110 from a computer that is separate from the computer or computers that distribute the first and second keys 215 and 220 for decrypting the first and second pieces of encrypted content.
  • While this application describes receiving, storing, manipulating and using a “key,” it will be understood that a host of know techniques can be used to disguise the key. For example, key hiding, key encryption, splitting the key into more than one piece to be stored separately, and obfuscation of read/write operations, can all be used and are considered within the general concept of receiving, storing, and using a “key.”
  • As mentioned above, the single media storage structure that is distributed by some embodiments includes a set of related pieces of content. In some embodiments, two pieces of content are related when they relate to the same audio and/or video presentation (e.g., song, movie, music video, etc.). In some cases, two pieces of related content can be viewed or played simultaneously. In other cases, two pieces of related content can be viewed or player independently.
  • FIGS. 4-10 illustrate various examples of related pieces of content in a media storage structure of some embodiments. FIG. 4 illustrates an example of a storage structure 400 where one piece of encrypted content is audio content 405 (e.g., an audio track, a song, a sound track) related to a particular presentation (e.g., a music video, a film, etc.), while the other piece of encrypted content is video content 410 (e.g., a video track, a video clip, etc.) related to the particular presentation.
  • FIG. 5 illustrates a storage structure 500 that includes two pieces of video content. One example of two such pieces of video content would be two video clips that are shot from different angles to cover one or more scenes in a movie. A piece of video content might also include audio content associated with its video content or might only include video data. FIG. 6 illustrates a storage structure 600 that includes two pieces of audio content. One example of two such pieces of audio content would be two different versions or mixes of a song.
  • Content other than audio or video might be stored in the media storage structure of the some embodiments of the invention. For instance, FIG. 7 illustrates a media storage structure 700 that stores one piece of audio content 705 and another piece of textual content 710, which might be lyrics, dialogue, or other data associated with the audio content 705. Similarly, FIG. 8 illustrates a media storage structure 800 that stores one piece of video content 805 and another piece of textual content 810, which might be dialogue associate with the video content 805.
  • In some cases, the system distributes a media storage structure that contains more than two pieces of content. For instance, FIG. 9 illustrates a media storage structure 900 that includes one piece of audio content (e.g., a song) along with two pieces of video content, which can be two different video clips associated with the audio content (e.g., can be two different music videos that are associated with the song). Similarly, FIG. 10 illustrates a media storage structure 1000 that includes one piece of video content (e.g., a movie) along with two pieces of audio content, which can be the video's audio component in two different languages.
  • In the various examples illustrated in FIGS. 4-10, the media storage structure includes a key for decrypting each piece of content stored in the media storage structure. As mentioned above, the content-distribution system of some embodiments allows different set of keys to be acquired (e.g., purchased or licensed) for accessing a media storage structure on a particular device. In some embodiments, the device stores the acquired set of keys in the media storage structure, and uses the acquired set of keys to decrypt and access the media storage structure's content that has been purchased or licensed for access on the device. Once decrypted, the device can individually or simultaneously view or play the decrypted pieces of content.
  • In some embodiments, the device (e.g., the computer) that receives the media storage structure transfers the media storage structure to another device (e.g., to a portable player). In this transfer, one of the pieces of content from the media storage structure might be removed in the transfer of the media storage structure to the other device (e.g., in the portable player). In some cases, one of the pieces of content is removed in order to reduce the consumption of resources on the other device.
  • Some embodiments above were illustrated by reference to a media storage structure that itself includes a plurality of sections available for storage of keys. Such storage sections can be incorporated into many media file formats, including the Quicktime file format, Windows Media file format, Real media format, ISO/IEC 14496-12, Motion JPEG, etc. One of ordinary skill will realize that in some embodiments the keys are alternatively stored and transferred separately from the unitary media files to which they pertain.
  • II. Content-Distribution System
  • FIG. 11 illustrates a content-distribution system 1100 of some embodiments. This content-distribution system distributes content in a manner that protects the digital rights (i.e., ensures the legal use) of the content. To distribute content that is related, the system distributes single media storage structures with multiple related pieces of content. In this example, the media storage structures are media files. One of ordinary skill will realize that other embodiments might use other types of storage structures.
  • As shown in FIG. 11, the content-distribution system 1100 includes a content-caching server 1105, a DRM server 1110, and a content-receiving computer 1115. The computer 1115 connects to the servers 1105 and 1110 through a computer network, such as a local area network, a wide area network, a network of networks (e.g., the Internet), etc.
  • Through this connection, the computer 1115 communicates with the DRM server 1110 to obtain content. In some embodiments, the content-distribution system 1100 does not entail the sale or licensing of content. Accordingly, in these embodiments, the DRM server 1110 simply enforces the distribution of content to authorized computers without considering any financial objectives.
  • For purposes of illustration, however, several embodiments of the content-distribution system 1100 that are described below are involved in the sale or licensing of the content. Accordingly, in these embodiments, the DRM server 1110 is the server from which the user of the computer 1115 can purchase or license content. In other words, the DRM server 1110 of some embodiments is the server that handles the financial transaction for purchasing or licensing content. In some instance, certain content can be purchased or licensed free.
  • After the DRM server 1110 determines that the computer 1115 can obtain the content, the content-distribution system 1100 uses the content caching server 1105 to provide a media storage file that contains one or more pieces of DRM content to the computer 1115 through the network 1120. In some embodiments, the system 1100 uses multiple caching servers 1105 to cache content at various locations on the network, in order to improve the speed and efficiency of downloading content across the network. For each media storage file that the DRM server 1110 directs the caching server 1105 to provide to the computer 1115, the DRM server 1110 provides a set of keys for the computer to use to decrypt the content that is stored in the media storage file.
  • FIG. 12 conceptually illustrates an example of one possible set of interactions between the computer 1115, the DRM server 1110, and the content-caching server 1105. This set of interactions represents a content-acquisition process 1200 of some embodiments of the invention. As shown in this figure, the acquisition process 1200 starts when the computer 1115 sends (at 1205) a request to the DRM server 1110 to purchase or license one or more pieces of content that are stored in a particular media file. At 1210, the DRM server receives this request.
  • The acquisition process then has the DRM server 1110 and/or purchasing computer 1115 perform one or more operations (at 1215) to complete the purchase or license transaction. After the transaction has been completed, the DRM server 1110 sends (at 1215) a request to the content-caching server 1105 to send the media file for the purchased or licensed content to the computer 1115.
  • The caching server 1105 receives this request at 1225, and in response, commences (at 1230) a download of the media file to the purchasing computer 1115. FIG. 11 illustrates an example of a media file 1125 that the content caching server 1105 downloads to the computer 1115. In this example, the media file has five sections. The first and second section 1145 and 1155 contain two pieces of encrypted content. Each piece of content is encrypted using a particular content key. The third and fourth sections 1150 and 1160 are empty sections in the file for the insertion of the content keys if such content keys are purchased or licensed by the computer 1115. Lastly, the fifth section 1165 is a header field, which contains metadata regarding the content and/or content keys.
  • The computer 1115 receives (at 1235) the media file provided by the caching server. The computer 1115 then sends (at 1240) a confirmation of the download to the DRM server 1110. After 1220, the DRM server 1110 transitions to a wait state 1245 to wait for the confirmation to be received from the computer 1115.
  • Once the DRM server 1110 receives the confirmation of the download at 1245, it sends (at 1250) to the computer 1115 a set of keys based on the pieces of content that the computer 1115 purchased or licensed. In the example illustrated in FIG. 11, the computer 1115 has acquired both pieces of content that is stored in the media file. Accordingly, in this example, the DRM server 1110 sends (at 1250) a set of keys that would allow the computer 1115 to access both pieces of content in the media file 1125.
  • In the example illustrated in FIG. 11, this set of keys includes two content keys 1130 and 1132. In some embodiments, each piece of content (e.g., 1145 or 1155) is encrypted based on a particular content key (e.g., 1130 or 1132). Hence, the computer 1115 uses the content key 1130 to decrypt the encrypted content 1145, and uses the content key 1132 to decrypt the encrypted content 1155.
  • FIG. 13 illustrates another example of the computer 1115 acquiring the media file 1125. In this example, the computer 1115 has only acquired the first encrypted content 1145. Accordingly, even though the caching server 1105 supplies the computer 1115 with the media file that contains both pieces of content, the DRM server 1110 only supplies the content key 1130 for the encrypted content 1145.
  • Accordingly, in this example, the computer can access the encrypted content 1145 in the media file by using the content key 1130. However, since the computer 1115 has not received the encrypted content for the encrypted content 1155 in the media file 1125, the computer cannot decrypt the encrypted content 1155.
  • As shown in FIG. 12, the computer 1115 receives (at 1255) the set of keys supplied by the DRM server 1110. As shown in FIG. 12, the computer 1115 stores (at 1260) this set of keys in the media file. FIG. 14 illustrates the computer's storage of the two keys that it receives in the example illustrated in FIG. 11. As shown in this figure, the computer 1115 initially stores the content keys 1130 and 1132 in temporary storages 1405 and 1407. It then merges these content keys with the media file 1125 that it received at 1235 and that it temporarily stored in a temporary storage 1410. The computer then stores the media file that results from this merging in a content library storage 1415.
  • FIG. 15 illustrates the computer's storage of the key that it receives in the example illustrated in FIG. 13. The storage operation illustrated in FIG. 15 is similar to the storage operation illustrated in FIG. 14, except that the merge file (stored in the content media library 1415) does not contain the content key 1132 for the second encrypted content as the computer did not acquire and receive this content key.
  • In the embodiments described above, the content-distribution system 1100 utilizes one computer to provide the encrypted content while using another computer to provide the keys necessary for decrypting the encrypted content. One of ordinary skill will realize that in other embodiments the content-distribution system utilizes one computer to provide encrypted content and the keys for decrypting the encrypted content.
  • Alternatively, in other embodiments, the content-distribution system uses more than one computer to provide the cryptographic keys for the content. For example, keys for audio content may be available from one server and keys for related video content stored in the same media storage structure may be available from a separate server. The multiple servers may even be owned and administered by different parties, as may be the rights they administer.
  • Also, in the embodiments described above, the content-distribution system 1100 provides different cryptographic keys for decrypting different pieces of content. In other embodiments, the content-distribution system might utilize different encoding schemes for encrypting different pieces of content. For instance, the system might utilize a symmetric encoding scheme to encrypt audio content but utilize an asymmetric encrypting scheme to encrypt video content. Alternatively, the system might encrypt audio content in its entirety, while encrypting only parts of the video content.
  • Also, FIG. 12 illustrates one possible set of interactions between the computer 1115, the DRM server 1110, and the caching server 1105. One of ordinary skill will realize that these computers might interact differently in other embodiments. For instance, in some embodiments, the computer 1115 does not send a confirmation of the receipt of a media file to the DRM server. In some of these embodiments, the DRM server on its own sends the set of keys to the computer 1115.
  • Although some embodiments have been described with reference to a simplified network configuration, it will be understood that many variations exist within the framework described herein. For example, the DRM server is shown as a single computer, but for the purposes of this patent, such a server could include many interconnected computers and/or memory and/or interconnecting pieces of equipment. Similarly, the content caching server could be a single computer or a collection of networked computers and memory all forming a server. Additionally, while content may be supplied from a content caching server directly or indirectly to a specific client computer, other transfer methods may result in a computer requiring keys to unlock content available to it from a peer computer, portable storage device, or some other transfer mechanism.
  • III. Synchronization with a Player
  • In some embodiments, the computer 1115 can synchronizes its DRM content with a portable player that is also allowed access to the DRM content. In some cases, this synchronization removes one or more pieces of content from a media file that the computer downloads to the portable player. In some cases, the pieces of content are removed in order to reduce the consumption of resources on the other device. In other cases, content is removed from the media storage structure because the other device does not have rights to access this other content.
  • FIG. 16 illustrates an example of the computer 1115 synchronize its DRM content with a portable player 1605. The portable player can be a music player, audio/video player, etc. When the computer 1115 synchronizes its DRM content with the player 1605, the portable player 1605 in some embodiments receives (1) DRM content from the computer 1115, and (2) a content key for decrypting each piece of DRM content that it receives. The portable then stores the received encrypted DRM content and the associated keys.
  • FIG. 17 conceptually illustrates a process 1700 that a computer 1115 performs in some embodiments to synchronize a set of content with a player 1605. As shown in this figure, the process 1700 starts (at 1705) when it receives a request to synchronize a set of content with the player 1605. The process then identifies (at 1710) the set of media files that is associated with a user account ID of the player.
  • Next, the process determines (at 1715) whether the computer 1115 is storing any media file for the player, which it has not yet downloaded to the player (i.e., whether there is any media file that needs to be synchronized between the computer and the player). If not, the process ends.
  • Otherwise, the process selects (at 1720) a media file that needs to be synchronized. At 1720, the process removes from the media file any piece of content that has been designated as content that should not be downloaded to the portable player. In some embodiments, the computer uses an application that allows a user to designate the content that the user wishes to synchronize with the portable player.
  • If the process removes (at 1720) any content from the media file, it also removes the content's associated content key and metadata from the media file in some embodiments of the invention. FIG. 16 illustrates an example of the removal of the video content and its associated content key from a media file 1600 that is downloaded to the portable player 1605.
  • After 1720, the process downloads (at 1725) the media file that contains only the encrypted content that has to be synchronized with the player (i.e., downloads the media file after any content that should not be downloaded to the player has been removed). In some embodiments, the downloaded media file not only contains one or more pieces of encrypted content but also contains one or more content keys that can be used to decrypt the content. In some embodiments, the set of keys that is downloaded in the media file to the player is the same set of keys that are used to decrypt the content on the computer 1115. In other embodiments, the keys in the downloaded media file are a different set of keys.
  • The player then stores (at 1725) the downloaded media file on its internal storage (e.g., its internal non-volatile storage, hard drive, flash memory, etc.). After 1725, the process determines (at 1730) whether there is any additional content for the player that it has not yet downloaded to the player (i.e., whether there is any additional content that needs to be synchronized between the computer and the player). If so, the process repeats 1720 and 1725 for a piece of content that needs to be synchronized. If not, the process ends.
  • FIG. 17 provides an illustrative example of synchronizing media files between a computer and a player in some embodiments of the invention. One of ordinary skill will realize that other embodiments use other processes for synchronizing media files. Also, in some embodiments, the portable player directly communicates with the DRM server and/or the content caching server to obtain content.
  • IV. Encryption
  • As described above, several embodiments of the invention provide DRM processes and systems for distributing content. These processes and systems encrypt and decrypt content based on cryptographic keys. Encrypting content entails transforming the content from a decipherable form (called plaintext) into an indecipherable form (called ciphertext) based on one or more cryptographic keys. Decrypting content entails transforming encrypted content into a decipherable from by using one or more cryptographic keys.
  • An encryption key is a piece of information that controls the operation of a cryptography algorithm. In symmetrical encryption technology, the key that is used to encrypt content is the same key that is used to decrypt content. In asymmetric encryption technology, the same key is not used to encrypt and decrypt the content. For instance, in one scheme, an encrypting device uses a public key of a recipient to encrypt content, and the recipient uses its private key to decrypt the encrypted content.
  • Many of the features of the embodiments described above can be implemented according to a symmetrical or asymmetrical encryption approach. Also, in some embodiments, the encryption is applied to a binary format of the content. Although the unencrypted binary format of a piece of content may be hard for a human to decipher, it can be deciphered by an application—or an operating system. On the other hand, encrypted binary format of a piece of content ideally should not be deciphered by any application or operating system, without first being decrypted by using one or more cryptographic keys.
  • While the invention has been described with reference to numerous specific details, one of ordinary skill in the art will recognize that the invention can be embodied in other specific forms without departing from the spirit of the invention. For instance, even though one set of keys are described above for the media storage files of some embodiments, other embodiments provide different sets of keys for defining different levels of access on different devices to the content of a media storage file. Thus, one of ordinary skill in the art would understand that the invention is not to be limited by the foregoing illustrative details, but rather is to be defined by the appended claims.

Claims (23)

1-21. (canceled)
22. A method for transferring encrypted content, the method comprising:
identifying a destination device for a media storage structure that includes (i) a set of encrypted content pieces that need to be transferred to the destination device and (ii) a set of keys for decrypting the encrypted content pieces, each key for decrypting a different content piece;
removing at least one encrypted content piece from the media storage structure that has been designated as a particular encrypted content piece that should not be transferred to the destination device;
removing the key associated with each of the removed encrypted content pieces; and
transferring the media storage structure to the destination device without the identified encrypted content pieces and keys.
23. The method of claim 22 further comprising receiving the media storage structure from a content-caching server before identifying the destination device for the media storage structure.
24. The method of claim 22 further comprising receiving the set of keys from a DRM server before identifying the destination device for the media storage structure.
25. The method of claim 24 further comprising storing the set of keys in the media storage structure before identifying the destination device for the media storage structure.
26. The method of claim 25, wherein the media storage structure further comprises a set of slots for storing the keys.
27. A non-transitory machine readable medium storing a program which when executed by at least one processing unit of a first device synchronizes encrypted content with a second device, the program comprising sets of instructions for:
identifying a media storage structure that includes (i) a set of encrypted content pieces that need to be transferred to the first device and (ii) a set of keys for decrypting the encrypted content pieces, each key for decrypting a different content piece;
removing at least one particular encrypted content piece that has been designated as a particular encrypted content piece from the media storage structure that should not be transferred to the second device;
removing the key associated with each of the removed encrypted content pieces; and
transferring the media storage structure to the second device without the identified particular encrypted content piece and key.
28. The non-transitory machine readable medium of claim 27, wherein the program further comprises a set of instructions for providing an interface that allows a user of the first device to designate which encrypted content pieces should be transferred to the second device.
29. The non-transitory machine readable medium of claim 27, wherein the set of instructions for identifying the media storage structure identifies the media storage structure based on a user account ID of the second device.
30. The non-transitory machine readable medium of claim 27, wherein the first device is a computer and the second device is a portable media player.
31. The non-transitory machine readable medium of claim 27, wherein the program further comprises a set of instructions for receiving a request to synchronize content with the second device.
32. A method for transferring related encrypted content pieces to user devices, the method comprising:
identifying that a media storage structure has been transferred to both a first device and a second device, the media storage structure storing a set of encrypted content pieces relating to a particular presentation, the set of encrypted content pieces comprising an audio clip, a first video clip, and a second video clip;
providing to the first device a first key for decrypting the audio clip and a second key for decrypting the first video clip; and
providing to the second device the first key for decrypting the audio clip and a third key for decrypting the second video clip.
33. The method of claim 32, wherein the particular presentation is a music video.
34. The method of claim 33, wherein the audio clip is an audio track for the music video.
35. The method of claim 33, wherein the first and second video clips comprise two different video clips from different angles of the music video.
36. The method of claim 32, wherein the first and second video clips two different music videos for the audio clip.
37. The method of claim 32, wherein the method is performed by a key distribution server in a DRM management system.
38. The method of claim 37, wherein the DRM management system comprises a content distribution server that transfers the media storage structure to the first device and the second device.
39. A method for transferring related encrypted content pieces to user devices, the method comprising:
identifying that a media storage structure has been transferred to both a first device and a second device, the media storage structure storing a set of encrypted content pieces relating to a particular presentation, the set of encrypted content pieces comprising a video clip, a first audio clip, and a second audio clip;
providing to the first device a first key for decrypting the video clip and a second key for decrypting the first audio clip; and
providing to the second device the first key for decrypting the video clip and a third key for decrypting the second audio clip.
40. The method of claim 39, wherein the particular presentation is a movie.
41. The method of claim 40, wherein the first audio clip is an audio track for the movie in a first language and the second audio clip is an audio track for the movie in a second language.
42. The method of claim 39, wherein the particular presentation is a music video, and wherein the first and second audio clips are two different mixes of the audio clip.
43. The method of claim 39, wherein the method is performed by a key distribution server, wherein a first content distribution server transfers the media storage structure to the first device and a second content distribution server transfers the media storage structure to the second device.
US13/612,766 2005-10-11 2012-09-12 Use of media storage structure with multiple pieces of content in a content-distribution system Active 2028-02-10 US10296879B2 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
US13/612,766 US10296879B2 (en) 2005-10-11 2012-09-12 Use of media storage structure with multiple pieces of content in a content-distribution system
US16/417,470 US11727376B2 (en) 2005-10-11 2019-05-20 Use of media storage structure with multiple pieces of content in a content-distribution system

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US11/249,123 US8306918B2 (en) 2005-10-11 2005-10-11 Use of media storage structure with multiple pieces of content in a content-distribution system
US13/612,766 US10296879B2 (en) 2005-10-11 2012-09-12 Use of media storage structure with multiple pieces of content in a content-distribution system

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
US11/249,123 Continuation US8306918B2 (en) 2005-10-11 2005-10-11 Use of media storage structure with multiple pieces of content in a content-distribution system

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US16/417,470 Division US11727376B2 (en) 2005-10-11 2019-05-20 Use of media storage structure with multiple pieces of content in a content-distribution system

Publications (2)

Publication Number Publication Date
US20130066785A1 true US20130066785A1 (en) 2013-03-14
US10296879B2 US10296879B2 (en) 2019-05-21

Family

ID=37668179

Family Applications (5)

Application Number Title Priority Date Filing Date
US11/249,123 Active US8306918B2 (en) 2005-10-11 2005-10-11 Use of media storage structure with multiple pieces of content in a content-distribution system
US13/612,780 Abandoned US20130067244A1 (en) 2005-10-11 2012-09-12 Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System
US13/612,766 Active 2028-02-10 US10296879B2 (en) 2005-10-11 2012-09-12 Use of media storage structure with multiple pieces of content in a content-distribution system
US13/612,747 Abandoned US20130073466A1 (en) 2005-10-11 2012-09-12 Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System
US16/417,470 Active 2028-07-19 US11727376B2 (en) 2005-10-11 2019-05-20 Use of media storage structure with multiple pieces of content in a content-distribution system

Family Applications Before (2)

Application Number Title Priority Date Filing Date
US11/249,123 Active US8306918B2 (en) 2005-10-11 2005-10-11 Use of media storage structure with multiple pieces of content in a content-distribution system
US13/612,780 Abandoned US20130067244A1 (en) 2005-10-11 2012-09-12 Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System

Family Applications After (2)

Application Number Title Priority Date Filing Date
US13/612,747 Abandoned US20130073466A1 (en) 2005-10-11 2012-09-12 Use of Media Storage Structure with Multiple Pieces of Content in a Content-Distribution System
US16/417,470 Active 2028-07-19 US11727376B2 (en) 2005-10-11 2019-05-20 Use of media storage structure with multiple pieces of content in a content-distribution system

Country Status (9)

Country Link
US (5) US8306918B2 (en)
EP (6) EP1777639A1 (en)
JP (4) JP4897820B2 (en)
KR (3) KR101067566B1 (en)
CN (2) CN101535987B (en)
AU (2) AU2006302090B2 (en)
CA (2) CA2625360C (en)
FR (2) FR2891971B1 (en)
WO (1) WO2007044825A2 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160073138A1 (en) * 2014-09-04 2016-03-10 Comcast Cable Communications, Llc User-Defined Content Streaming
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10417392B2 (en) 2006-05-03 2019-09-17 Apple Inc. Device-independent management of cryptographic information

Families Citing this family (43)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8225359B2 (en) 2002-12-24 2012-07-17 Poltorak Alexander I Apparatus and method for providing information in conjunction with media content
US7164882B2 (en) * 2002-12-24 2007-01-16 Poltorak Alexander I Apparatus and method for facilitating a purchase using information provided on a media playing device
US8306918B2 (en) 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US20070244827A1 (en) * 2006-04-18 2007-10-18 Sony Corporation Method for Securing a Hard Drive and Preventing Cloning or Tampering Attacks
US7920700B2 (en) * 2006-10-19 2011-04-05 Oracle International Corporation System and method for data encryption
US8635194B2 (en) * 2006-10-19 2014-01-21 Oracle International Corporation System and method for data compression
US9465823B2 (en) * 2006-10-19 2016-10-11 Oracle International Corporation System and method for data de-duplication
US8041641B1 (en) * 2006-12-19 2011-10-18 Symantec Operating Corporation Backup service and appliance with single-instance storage of encrypted data
US8347098B2 (en) 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US20080320545A1 (en) * 2007-06-22 2008-12-25 Schwartz Richard T System and method for providing audio-visual programming with alternative content
MX2010000921A (en) * 2007-07-23 2010-08-02 Intertrust Tech Corp Dynamic media zones systems and methods.
WO2009100420A2 (en) * 2008-02-07 2009-08-13 Realnetworks, Inc. Selective advertising in media content
US8527525B2 (en) * 2008-06-30 2013-09-03 Microsoft Corporation Providing multiple degrees of context for content consumed on computers and media players
US8326221B2 (en) * 2009-02-09 2012-12-04 Apple Inc. Portable electronic device with proximity-based content synchronization
US8250379B2 (en) * 2009-10-13 2012-08-21 Microsoft Corporation Secure storage of temporary secrets
US8977783B2 (en) * 2009-10-21 2015-03-10 Media Ip, Llc High-speed secure content transfer to SD card from kiosk
US9595300B2 (en) * 2009-10-21 2017-03-14 Media Ip, Llc Contextual chapter navigation
US8898803B1 (en) 2010-01-11 2014-11-25 Media Ip, Llc Content and identity delivery system for portable playback of content and streaming service integration
JP5573272B2 (en) * 2010-03-24 2014-08-20 富士通株式会社 DIGITAL CONTENT DISTRIBUTION PROGRAM, REPRODUCTION PROGRAM, DISTRIBUTION DEVICE, AND REPRODUCTION DEVICE
JP5573489B2 (en) 2010-08-23 2014-08-20 ソニー株式会社 Information processing apparatus, information processing method, and program
US20120060035A1 (en) * 2010-09-08 2012-03-08 Microsoft Corporation Secure and Verifiable Data Handling
US20120123889A1 (en) * 2010-10-26 2012-05-17 Mosquera Luis D System and method for streamlined acquisition, download and opening of digital content
US8745749B2 (en) 2010-11-15 2014-06-03 Media Ip, Llc Virtual secure digital card
US8775827B2 (en) 2011-03-28 2014-07-08 Media Ip, Llc Read and write optimization for protected area of memory
US8949879B2 (en) 2011-04-22 2015-02-03 Media Ip, Llc Access controls for known content
US9086999B2 (en) 2011-07-05 2015-07-21 International Business Machines Corporation Data encryption management
GB2493496B (en) * 2011-07-12 2014-05-14 Nds Ltd Software DRM offline purchase
US8478693B1 (en) * 2012-02-13 2013-07-02 Google Inc. Framework for specifying access to protected content
US8887304B2 (en) * 2012-04-11 2014-11-11 Comcast Cable Communications, Llc System and method for processing user rights
US8769015B2 (en) * 2012-07-30 2014-07-01 Thales Avionics, Inc. Content distribution methods for a ring network and related systems and computer program products
US20140172603A1 (en) * 2012-12-13 2014-06-19 Digiboo Llc System and method for wireless content delivery and transaction management
US9219791B2 (en) 2012-12-13 2015-12-22 Digiboo Llc Digital filling station for digital locker content
US9141811B2 (en) * 2013-08-01 2015-09-22 Dropbox, Inc. Coerced encryption on connected devices
US9852273B2 (en) * 2014-03-12 2017-12-26 Disney Enterprises, Inc. Methods and systems of playing multi-license media content
US9537934B2 (en) * 2014-04-03 2017-01-03 Facebook, Inc. Systems and methods for interactive media content exchange
US9430405B2 (en) 2014-06-18 2016-08-30 Fastly, Inc. Encrypted purging of data from content node storage
US9800911B2 (en) 2015-06-26 2017-10-24 Intel Corporation Technologies for selective content licensing and secure playback
EP3347868A4 (en) * 2015-09-09 2019-04-17 Mastercard International Incorporated Method and system for intelligent storage and distribution of media keys for content delivery
WO2018057762A1 (en) * 2016-09-26 2018-03-29 Google Llc A user interface for access control enabled peer-to-peer sharing
CN108494554B (en) * 2018-03-22 2020-10-13 武汉大学 Data symmetric encryption method based on double plaintexts
CN113557513A (en) * 2019-03-21 2021-10-26 谷歌有限责任公司 Content encryption
CN111680307A (en) * 2020-04-23 2020-09-18 平安科技(深圳)有限公司 Distributed data encryption method and device, cloud storage server and storage medium
CN113613040A (en) * 2021-10-11 2021-11-05 北京创米智汇物联科技有限公司 Video file encryption method, decryption method and key management method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5673316A (en) * 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US20010056539A1 (en) * 1996-12-04 2001-12-27 Dominique Vincent Pavlin Software protection device and method
US6675215B1 (en) * 2000-02-17 2004-01-06 Microsoft Corporation Automatic baud rate detection of null modem unimodem client connection
US20040260716A1 (en) * 2001-10-31 2004-12-23 Masataka Sugiura Content information transferring device and content information receiving device
US20060173783A1 (en) * 2005-01-26 2006-08-03 Marples David J System and method for authorized digital content distribution
US20070150917A1 (en) * 2003-05-28 2007-06-28 Fernandez Dennis S Network-extensible reconfigurable media appliance

Family Cites Families (216)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
FR2644962A1 (en) * 1989-03-24 1990-09-28 Labo Electronique Physique DEVICE FOR ENCODING DIGITAL VIDEO SIGNALS
US5103476A (en) 1990-11-07 1992-04-07 Waite David P Secure system for activating personal computer software at remote locations
JPH0799497B2 (en) * 1990-12-14 1995-10-25 インターナショナル・ビジネス・マシーンズ・コーポレイション Device and method for controlling the use of software
US5351083A (en) * 1991-10-17 1994-09-27 Sony Corporation Picture encoding and/or decoding system
US5214507A (en) * 1991-11-08 1993-05-25 At&T Bell Laboratories Video signal quantization for an mpeg like coding environment
KR940011605B1 (en) * 1991-12-20 1994-12-22 삼성전자 주식회사 Image compressing method
EP0614308A1 (en) 1993-03-05 1994-09-07 Eastman Kodak Company Method and apparatus for controlling access to selected image components in an image storage and retrieval system
US5596639A (en) 1993-07-26 1997-01-21 Elonex Ip Holdings Ltd. Cd-prom
US6611607B1 (en) 1993-11-18 2003-08-26 Digimarc Corporation Integrating digital watermarks in multimedia content
EP1691316A1 (en) * 1994-10-27 2006-08-16 Intarsia Software LLC Data copyright management system
US6076077A (en) * 1995-10-27 2000-06-13 Mitsubishi Corporation Data management system
US5638443A (en) 1994-11-23 1997-06-10 Xerox Corporation System for controlling the distribution and use of composite digital works
JPH08263438A (en) * 1994-11-23 1996-10-11 Xerox Corp Distribution and use control system of digital work and access control method to digital work
US7124302B2 (en) * 1995-02-13 2006-10-17 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US7133845B1 (en) * 1995-02-13 2006-11-07 Intertrust Technologies Corp. System and methods for secure transaction management and electronic rights protection
EP1643340B1 (en) * 1995-02-13 2013-08-14 Intertrust Technologies Corp. Secure transaction management
US6948070B1 (en) * 1995-02-13 2005-09-20 Intertrust Technologies Corporation Systems and methods for secure transaction management and electronic rights protection
US5729294A (en) * 1995-04-05 1998-03-17 International Business Machines Corporation Motion video compression system with novel adaptive quantization
US5719937A (en) 1995-12-06 1998-02-17 Solana Technology Develpment Corporation Multi-media copy management system
US5982506A (en) * 1996-09-10 1999-11-09 E-Stamp Corporation Method and system for electronic document certification
JPH10108148A (en) * 1996-09-27 1998-04-24 Sony Corp Method for protecting copyright of digital data and protection system
US6249866B1 (en) * 1997-09-16 2001-06-19 Microsoft Corporation Encrypting file system and method
SE9703379D0 (en) * 1997-09-18 1997-09-18 Astra Ab New compounds
US6385596B1 (en) * 1998-02-06 2002-05-07 Liquid Audio, Inc. Secure online music distribution system
US6513117B2 (en) 1998-03-04 2003-01-28 Gemstar Development Corporation Certificate handling for digital rights management system
US7809138B2 (en) * 1999-03-16 2010-10-05 Intertrust Technologies Corporation Methods and apparatus for persistent control and protection of content
JP3218007B2 (en) * 1998-03-20 2001-10-15 富士通株式会社 Index management apparatus, update method and management method, and computer-readable storage medium
US6389073B1 (en) * 1998-04-07 2002-05-14 Matsushita Electric Industrial Co. Ltd Coding control method, coding control apparatus and storage medium containing coding control program
US6298446B1 (en) * 1998-06-14 2001-10-02 Alchemedia Ltd. Method and system for copyright protection of digital images transmitted over networks
US6212232B1 (en) * 1998-06-18 2001-04-03 Compaq Computer Corporation Rate control and bit allocation for low bit rate video communication applications
US6263348B1 (en) * 1998-07-01 2001-07-17 Serena Software International, Inc. Method and apparatus for identifying the existence of differences between two files
US6859791B1 (en) * 1998-08-13 2005-02-22 International Business Machines Corporation Method for determining internet users geographic region
US7962413B2 (en) * 1998-08-13 2011-06-14 International Business Machines Corporation End-user system of preventing unauthorized rerecording of multimedia content
US6389403B1 (en) 1998-08-13 2002-05-14 International Business Machines Corporation Method and apparatus for uniquely identifying a customer purchase in an electronic distribution system
US7346580B2 (en) * 1998-08-13 2008-03-18 International Business Machines Corporation Method and system of preventing unauthorized rerecording of multimedia content
US6983371B1 (en) * 1998-10-22 2006-01-03 International Business Machines Corporation Super-distribution of protected digital content
US7110984B1 (en) * 1998-08-13 2006-09-19 International Business Machines Corporation Updating usage conditions in lieu of download digital rights management protected content
US6959288B1 (en) * 1998-08-13 2005-10-25 International Business Machines Corporation Digital content preparation system
US7017188B1 (en) * 1998-11-16 2006-03-21 Softricity, Inc. Method and apparatus for secure content delivery over broadband access networks
SE513356C2 (en) 1998-11-20 2000-08-28 Ericsson Telefon Ab L M Method and apparatus for encrypting images
EP1069567A1 (en) * 1999-02-08 2001-01-17 Sony Corporation Information recording/reproducing system
WO2000052581A1 (en) * 1999-03-03 2000-09-08 Sony Corporation Data processing device, data processing method, terminal, transmission method for data processing device
JP3553847B2 (en) * 1999-03-12 2004-08-11 松下電器産業株式会社 Content duplication system, drive device, duplication method, and computer-readable recording medium
US6816596B1 (en) * 2000-01-14 2004-11-09 Microsoft Corporation Encrypting a digital object based on a key ID selected therefor
US7103574B1 (en) 1999-03-27 2006-09-05 Microsoft Corporation Enforcement architecture and method for digital rights management
US20020019814A1 (en) 2001-03-01 2002-02-14 Krishnamurthy Ganesan Specifying rights in a digital rights license according to events
US6829708B1 (en) * 1999-03-27 2004-12-07 Microsoft Corporation Specifying security for an element by assigning a scaled value representative of the relative security thereof
EP1120715A4 (en) * 1999-07-06 2005-02-16 Sony Corp Data providing system, device, and method
JP2001034470A (en) * 1999-07-22 2001-02-09 Fujitsu Ltd Server having management automating mechanism
US6886098B1 (en) 1999-08-13 2005-04-26 Microsoft Corporation Systems and methods for compression of key sets having multiple keys
WO2001016776A1 (en) * 1999-08-27 2001-03-08 Sony Corporation Information transmission system, transmitter, and transmission method as well as information reception system, receiver and reception method
US6289455B1 (en) * 1999-09-02 2001-09-11 Crypotography Research, Inc. Method and apparatus for preventing piracy of digital content
EP1132828A4 (en) * 1999-09-17 2007-10-10 Sony Corp Data providing system and method therefor
US7080037B2 (en) * 1999-09-28 2006-07-18 Chameleon Network Inc. Portable electronic authorization system and method
EP1237324A4 (en) * 1999-12-02 2008-12-10 Sanyo Electric Co Memory card and data distribution system using it
US7213005B2 (en) * 1999-12-09 2007-05-01 International Business Machines Corporation Digital content distribution using web broadcasting services
US6772340B1 (en) * 2000-01-14 2004-08-03 Microsoft Corporation Digital rights management system operating on computing device and having black box tied to computing device
AU2000269232A1 (en) * 2000-01-14 2001-07-24 Microsoft Corporation Specifying security for an element by assigning a scaled value representative ofthe relative security thereof
US7353209B1 (en) * 2000-01-14 2008-04-01 Microsoft Corporation Releasing decrypted digital content to an authenticated path
EP1134977A1 (en) * 2000-03-06 2001-09-19 Irdeto Access B.V. Method and system for providing copies of scrambled content with unique watermarks, and system for descrambling scrambled content
JP2001256196A (en) 2000-03-14 2001-09-21 Sony Corp Limiting system for inter-generation distribution of contents, limiting method for inter-generation distribution of contents and program provision medium
US7426558B1 (en) * 2000-05-11 2008-09-16 Thomson Licensing Method and system for controlling and auditing content/service systems
US6980972B1 (en) * 2000-05-11 2005-12-27 Thomson Licensing S.A. Method and system for controlling and auditing content/service systems
US6986046B1 (en) 2000-05-12 2006-01-10 Groove Networks, Incorporated Method and apparatus for managing secure collaborative transactions
EP1287474B1 (en) 2000-06-05 2016-02-03 Sealedmedia Limited Digital rights management
EP2770455B1 (en) * 2000-06-16 2017-01-25 MIH Technology Holdings BV Method and system to exercise geographic restrictions over the distribution of content via a network
JP2002007733A (en) 2000-06-19 2002-01-11 Yamaha Corp Method and device for releasing contents function regulation, and recording medium
AU2001271704A1 (en) 2000-06-29 2002-01-14 Cachestream Corporation Digital rights management
WO2002003189A1 (en) * 2000-06-30 2002-01-10 Zinio Systems, Inc. System and method for encrypting, distributing and viewing electronic documents
AU2001266222A1 (en) 2000-06-30 2002-01-14 The Virtual Orchestra Company Limited Electronic musical accompaniment
US20020178360A1 (en) * 2001-02-25 2002-11-28 Storymail, Inc. System and method for communicating a secure unidirectional response message
EP1189432A3 (en) 2000-08-14 2004-10-20 Matsushita Electric Industrial Co., Ltd. A hierarchical encryption scheme for secure distribution of predetermined content
EP1182874A1 (en) * 2000-08-24 2002-02-27 Canal+ Technologies Société Anonyme Digital content protection system
US7136486B2 (en) * 2000-09-11 2006-11-14 Seiko Epson Corporation Print system and printer capable of prevention of unjust copy print
US6915425B2 (en) * 2000-12-13 2005-07-05 Aladdin Knowledge Systems, Ltd. System for permitting off-line playback of digital content, and for managing content rights
WO2002029509A2 (en) * 2000-10-03 2002-04-11 Vidius Inc. Secure distribution of digital content
US6507727B1 (en) 2000-10-13 2003-01-14 Robert F. Henrick Purchase and delivery of digital content using multiple devices and data networks
EP2378733B1 (en) 2000-11-10 2013-03-13 AOL Inc. Digital content distribution and subscription system
US7818443B2 (en) * 2000-12-01 2010-10-19 O2Micro International Ltd. Low power digital audio decoding/playing system for computing devices
US7251833B2 (en) 2000-12-29 2007-07-31 International Business Machines Corporation Digital media delivery with local cache and streaming tokens
JP2002269275A (en) * 2001-03-07 2002-09-20 Nippon Telegr & Teleph Corp <Ntt> Digital information selling method and system
KR100413627B1 (en) * 2001-03-19 2003-12-31 스톰 씨엔씨 인코포레이티드 System for jointing digital literary works against unlawful reproduction through communication network and method for there of
US20020138593A1 (en) 2001-03-26 2002-09-26 Novak Michael J. Methods and systems for retrieving, organizing, and playing media content
US7512986B2 (en) 2001-03-28 2009-03-31 Nds Limited Digital rights management system and method
JP3770101B2 (en) * 2001-04-17 2006-04-26 ソニー株式会社 Data transfer method, transfer data recording method, data transfer system, and data transfer device
US8099364B2 (en) 2001-05-31 2012-01-17 Contentguard Holdings, Inc. Digital rights management of content when content is a future live event
US6715050B2 (en) * 2001-05-31 2004-03-30 Oracle International Corporation Storage access keys
JP2003058660A (en) 2001-06-07 2003-02-28 Matsushita Electric Ind Co Ltd Contents use management system and server used for the same
JP3778009B2 (en) * 2001-06-13 2006-05-24 ソニー株式会社 Data transfer system, data transfer device, data recording device, and data management method
JP3809779B2 (en) * 2001-06-18 2006-08-16 ソニー株式会社 Data transfer system, data transfer device, data recording device, and data transfer method
EP1407337B1 (en) 2001-06-26 2013-01-30 Sealedmedia Limited Digital rights management
US7203966B2 (en) * 2001-06-27 2007-04-10 Microsoft Corporation Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices
US7239708B2 (en) 2001-06-27 2007-07-03 Microsoft Corporation Protecting decrypted compressed content and decrypted decompressed content at a digital rights management client
US20030002668A1 (en) 2001-06-30 2003-01-02 Gary Graunke Multi-level, multi-dimensional content protections
US7421411B2 (en) 2001-07-06 2008-09-02 Nokia Corporation Digital rights management in a mobile communications environment
US7249107B2 (en) * 2001-07-20 2007-07-24 Microsoft Corporation Redistribution of rights-managed content
JP2003050588A (en) * 2001-08-06 2003-02-21 Pioneer Electronic Corp Management server device for contents providing system, and terminal device
US7778925B2 (en) * 2001-09-18 2010-08-17 Sony Corporation Audio and video digital content delivery
US7054841B1 (en) * 2001-09-27 2006-05-30 I2 Technologies Us, Inc. Document storage and classification
JP3841337B2 (en) * 2001-10-03 2006-11-01 日本放送協会 Content transmission device, content reception device, content transmission program, and content reception program
US7352868B2 (en) 2001-10-09 2008-04-01 Philip Hawkes Method and apparatus for security in a data processing system
GB2387001B (en) * 2001-10-22 2005-02-02 Apple Computer Intelligent interaction between media player and host computer
AU2002350209A1 (en) * 2001-11-20 2003-06-10 Contentguard Holdings, Inc. An extensible rights expression processing system
US6865555B2 (en) 2001-11-21 2005-03-08 Digeo, Inc. System and method for providing conditional access to digital content
US7162451B2 (en) * 2001-11-30 2007-01-09 International Business Machines Corporation Information content distribution based on privacy and/or personal information
WO2003055219A2 (en) 2001-12-11 2003-07-03 Telefonaktiebolaget Lm Ericsson (Publ.) Method of rights management for streaming media
US7096203B2 (en) * 2001-12-14 2006-08-22 Duet General Partnership Method and apparatus for dynamic renewability of content
US7242773B2 (en) * 2002-09-09 2007-07-10 Sony Corporation Multiple partial encryption using retuning
JP3871201B2 (en) * 2002-01-29 2007-01-24 ソニー株式会社 Content provision acquisition system
US7376624B2 (en) * 2002-02-27 2008-05-20 Imagineer Software, Inc. Secure communication and real-time watermarking using mutating identifiers
US7007047B2 (en) * 2002-03-29 2006-02-28 Panasas, Inc. Internally consistent file system image in distributed object-based data storage
US7249264B2 (en) * 2002-04-02 2007-07-24 International Business Machines Corporation Secure IP based streaming in a format independent manner
US7797446B2 (en) 2002-07-16 2010-09-14 Apple Inc. Method and system for updating playlists
US7133905B2 (en) * 2002-04-09 2006-11-07 Akamai Technologies, Inc. Method and system for tiered distribution in a content delivery network
US7272858B2 (en) 2002-04-16 2007-09-18 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on a relatively simple device
US7395438B2 (en) 2002-04-16 2008-07-01 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
JP2004007567A (en) * 2002-04-17 2004-01-08 Toshiba Corp Communications system, communications method, and communications program
US7316033B2 (en) * 2002-11-25 2008-01-01 Music Public Broadcasting, Inc. Method of controlling recording of media
US7680743B2 (en) 2002-05-15 2010-03-16 Microsoft Corporation Software application protection by way of a digital rights management (DRM) system
US7565537B2 (en) * 2002-06-10 2009-07-21 Microsoft Corporation Secure key exchange with mutual authentication
US7152166B2 (en) * 2002-06-26 2006-12-19 Microsoft Corporation Digital rights management (DRM) encryption and data-protection for content on device without interactive authentication
US7108171B1 (en) * 2002-07-02 2006-09-19 Michael Jared Ergo Methods of temporarily providing digital content to a customer
JP4050951B2 (en) * 2002-07-31 2008-02-20 ソニー株式会社 Medium information reproducing method, medium information reproducing apparatus and information service system
US7184550B2 (en) * 2002-08-15 2007-02-27 Intel Corporation Method and apparatus for simultaneous decryption and re-encryption of publicly distributed content via stream ciphers
JP2005536938A (en) * 2002-08-20 2005-12-02 コーニンクレッカ フィリップス エレクトロニクス エヌ ヴィ Mobile network authentication to protect stored content
US20060010500A1 (en) * 2004-02-03 2006-01-12 Gidon Elazar Protection of digital data content
US20040039932A1 (en) * 2002-08-23 2004-02-26 Gidon Elazar Apparatus, system and method for securing digital documents in a digital appliance
US7170999B1 (en) * 2002-08-28 2007-01-30 Napster, Inc. Method of and apparatus for encrypting and transferring files
US20050144468A1 (en) * 2003-01-13 2005-06-30 Northcutt J. D. Method and apparatus for content protection in a personal digital network environment
EP1547369A2 (en) 2002-09-23 2005-06-29 Koninklijke Philips Electronics N.V. Certificate based authorized domains
JP2004139433A (en) * 2002-10-18 2004-05-13 Toshiba Corp Terminal, recording medium to be used in terminal, contents management system, and its management server
US8387106B2 (en) * 2002-12-11 2013-02-26 Broadcom Corporation Method and system for secure linking with authentication and authorization in a media exchange network
US7581255B2 (en) 2003-01-21 2009-08-25 Microsoft Corporation Systems and methods for licensing one or more data streams from an encoded digital media file
KR100513297B1 (en) 2003-01-24 2005-09-09 삼성전자주식회사 System of managing mutimedia file in intranet and method thereof
US20060053079A1 (en) 2003-02-03 2006-03-09 Brad Edmonson User-defined electronic stores for marketing digital rights licenses
CN100524330C (en) 2003-02-06 2009-08-05 诺基亚有限公司 System and method for locally sharing subscription of multimedia content
JP2004260639A (en) * 2003-02-27 2004-09-16 Hitachi Ltd Method for embedding data and method for confirming viewing and listening
JP2004265194A (en) 2003-03-03 2004-09-24 Matsushita Electric Ind Co Ltd Information processing apparatus and information processing method
US7310729B2 (en) 2003-03-12 2007-12-18 Limelight Networks, Inc. Digital rights management license delivery system and method
CA2519116C (en) 2003-03-13 2012-11-13 Drm Technologies, Llc Secure streaming container
US9274576B2 (en) 2003-03-17 2016-03-01 Callahan Cellular L.L.C. System and method for activation of portable and mobile media player devices for wireless LAN services
US7278165B2 (en) 2003-03-18 2007-10-02 Sony Corporation Method and system for implementing digital rights management
US7007170B2 (en) * 2003-03-18 2006-02-28 Widevine Technologies, Inc. System, method, and apparatus for securely providing content viewable on a secure device
US7412060B2 (en) 2003-03-28 2008-08-12 D&M Holdings Inc. Contents data transmission/reception system, contents data transmitter, contents data receiver and contents data transmission/reception method
US7313814B2 (en) 2003-04-01 2007-12-25 Microsoft Corporation Scalable, error resilient DRM for scalable media
US20050203959A1 (en) 2003-04-25 2005-09-15 Apple Computer, Inc. Network-based purchase and distribution of digital media items
KR20070046171A (en) 2003-04-25 2007-05-02 애플 컴퓨터, 인코포레이티드 Methods and system for secure network-based distribution of content
US7426637B2 (en) * 2003-05-21 2008-09-16 Music Public Broadcasting, Inc. Method and system for controlled media sharing in a network
JP4247044B2 (en) * 2003-05-23 2009-04-02 株式会社東芝 Content distribution service providing apparatus and content distribution service terminal apparatus
US7281214B2 (en) * 2003-06-02 2007-10-09 Apple Inc. Automatically updating user programmable input sensors to perform user specified functions
US20050027991A1 (en) * 2003-06-23 2005-02-03 Difonzo Joseph System and method for digital rights management
JP4227479B2 (en) * 2003-07-10 2009-02-18 日本電信電話株式会社 Encapsulation apparatus, license generation apparatus, service provision apparatus, encapsulation program, license generation program, and service provision program
GB2404467A (en) 2003-07-31 2005-02-02 Sony Uk Ltd Access control for digital content
US7389273B2 (en) * 2003-09-25 2008-06-17 Scott Andrew Irwin System and method for federated rights management
US7480382B2 (en) 2003-09-30 2009-01-20 Microsoft Corporation Image file container
US20130097302A9 (en) * 2003-10-01 2013-04-18 Robert Khedouri Audio visual player apparatus and system and method of content distribution using the same
US20060008256A1 (en) * 2003-10-01 2006-01-12 Khedouri Robert K Audio visual player apparatus and system and method of content distribution using the same
US8103004B2 (en) 2003-10-03 2012-01-24 Sony Corporation Method, apparatus and system for use in distributed and parallel decryption
WO2005033892A2 (en) * 2003-10-03 2005-04-14 Sony Electronics, Inc. Rendering rights delegation system and method
US7281274B2 (en) 2003-10-16 2007-10-09 Lmp Media Llc Electronic media distribution system
US7421741B2 (en) * 2003-10-20 2008-09-02 Phillips Ii Eugene B Securing digital content system and method
US20050091173A1 (en) 2003-10-24 2005-04-28 Nokia Corporation Method and system for content distribution
US20050102513A1 (en) 2003-11-10 2005-05-12 Nokia Corporation Enforcing authorized domains with domain membership vouchers
US7539307B2 (en) * 2003-11-26 2009-05-26 International Business Machines Corporation System, method, and service for delivering enhanced multimedia content on physical media
JP4580635B2 (en) * 2003-12-10 2010-11-17 ソニー株式会社 In-vehicle communication system and communication method, in-vehicle communication terminal and communication method, program recording medium, and program
JP4900801B2 (en) * 2003-12-23 2012-03-21 ザ・ディレクティービー・グループ・インコーポレイテッド System and method for distributing media in a pay-per-play architecture with remote playback within an enterprise
JP4705324B2 (en) * 2003-12-26 2011-06-22 富士通株式会社 Data operation method
US20050193205A1 (en) * 2004-01-09 2005-09-01 Widevine Technologies, Inc. Method and system for session based watermarking of encrypted content
US7570761B2 (en) * 2004-02-03 2009-08-04 Trimble Navigation Limited Method and system for preventing unauthorized recording of media content in the iTunes™ environment
US7870385B2 (en) * 2004-02-03 2011-01-11 Music Public Broadcasting, Inc. Method and system for controlling presentation of computer readable media on a media storage device
US7802095B2 (en) * 2004-02-03 2010-09-21 Music Public Broadcasting, Inc. Method and system for preventing unauthorized recording of media content on a Macintosh operating system
US20050177745A1 (en) * 2004-02-11 2005-08-11 Alio, Inc. Distributed System and Methodology for Delivery of Media Content
US7546641B2 (en) 2004-02-13 2009-06-09 Microsoft Corporation Conditional access to digital rights management conversion
KR101254209B1 (en) 2004-03-22 2013-04-23 삼성전자주식회사 Apparatus and method for moving and copying right objects between device and portable storage device
KR20050096040A (en) 2004-03-29 2005-10-05 삼성전자주식회사 Method for playbacking content using portable storage by digital rights management, and portable storage for the same
EP1735939A1 (en) * 2004-03-29 2006-12-27 Smart Internet Technology Crc Pty Limited Digital license sharing system and method
JP4643164B2 (en) 2004-03-29 2011-03-02 パナソニック株式会社 Content transmitting apparatus and content receiving apparatus
JP2005317177A (en) * 2004-03-30 2005-11-10 Sanyo Electric Co Ltd Device and method for recording/reproducing
US7392381B2 (en) * 2004-04-13 2008-06-24 Intel Corporation Proactive forced renewal of content protection implementations
US20070276760A1 (en) * 2004-04-30 2007-11-29 Matsushita Electric Industrial Co., Ltd. Digital Copyright Management Using Secure Device
KR101169021B1 (en) 2004-05-31 2012-07-26 삼성전자주식회사 Method and Apparatus for sending right object information between device and portable storage
GB0412338D0 (en) * 2004-06-03 2004-07-07 Koninkl Philips Electronics Nv Transfer of content between storage devices
US20050273629A1 (en) * 2004-06-04 2005-12-08 Vitalsource Technologies System, method and computer program product for providing digital rights management of protected content
US7711647B2 (en) 2004-06-10 2010-05-04 Akamai Technologies, Inc. Digital rights management in a distributed network
JP4319094B2 (en) * 2004-06-11 2009-08-26 ソニー株式会社 Data processing apparatus, data processing method, program, program recording medium, and data recording medium
US20060005257A1 (en) * 2004-07-01 2006-01-05 Nakahara Tohru Encrypted contents recording medium and apparatus and method for reproducing encrypted contents
US7237268B2 (en) * 2004-07-13 2007-06-26 Fields Daniel M Apparatus and method for storing and distributing encrypted digital content and functionality suite associated therewith
WO2006009215A1 (en) 2004-07-21 2006-01-26 Sony Corporation Contents reproducing device, contents processing device, contents distribution server, contents reproducing method, contents processing method, and program
KR100636169B1 (en) 2004-07-29 2006-10-18 삼성전자주식회사 Method for transmitting content which is processed by various DRM System, and the method for reproducing the contents
CA2476919C (en) 2004-08-09 2007-12-04 Research In Motion Limited Automated key management system and method
US8112361B2 (en) * 2004-08-10 2012-02-07 Hiro Media Ltd. Method and system for dynamic, real-time addition of advertisement to downloaded static content
KR100636173B1 (en) * 2004-09-13 2006-10-19 삼성전자주식회사 Method and Apparatus for multi-streaming using temporary storing
EP1807746A1 (en) * 2004-09-23 2007-07-18 Nokia Corporation Method and device for protecting digital content in mobile applications
US20090063871A1 (en) * 2004-10-11 2009-03-05 Dirk Frijters Method and device for managing proprietary data format content
US7266198B2 (en) 2004-11-17 2007-09-04 General Instrument Corporation System and method for providing authorized access to digital content
WO2006101549A2 (en) 2004-12-03 2006-09-28 Whitecell Software, Inc. Secure system for allowing the execution of authorized computer program code
US8099369B2 (en) * 2004-12-08 2012-01-17 Ngna, Llc Method and system for securing content in media systems
WO2006066052A2 (en) * 2004-12-16 2006-06-22 Sonic Solutions Methods and systems for use in network management of content
US7860802B2 (en) * 2005-02-01 2010-12-28 Microsoft Corporation Flexible licensing architecture in content rights management systems
US7778417B2 (en) * 2005-05-17 2010-08-17 International Business Machines Corporation System and method for managing encrypted content using logical partitions
US7567671B2 (en) * 2005-06-10 2009-07-28 Aniruddha Gupte Encryption method and apparatus for use in digital distribution system
US7814022B2 (en) * 2005-06-10 2010-10-12 Aniruddha Gupte Enhanced media method and apparatus for use in digital distribution system
US8341527B2 (en) * 2005-06-10 2012-12-25 Aniruddha Gupte File format method and apparatus for use in digital distribution system
AU2012227266B2 (en) 2005-10-11 2014-06-19 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
US8306918B2 (en) 2005-10-11 2012-11-06 Apple Inc. Use of media storage structure with multiple pieces of content in a content-distribution system
EP1946316A1 (en) * 2005-11-09 2008-07-23 Nero AG Method and means for writing decryption information to a storage medium, storage medium, method and means for reading data from a storage medium, and computer program
US7526451B2 (en) * 2006-02-03 2009-04-28 Motorola, Inc. Method of transferring digital rights
US7555464B2 (en) 2006-03-01 2009-06-30 Sony Corporation Multiple DRM management
JP2007251348A (en) * 2006-03-14 2007-09-27 Toshiba Corp Content decoding device
US8224751B2 (en) 2006-05-03 2012-07-17 Apple Inc. Device-independent management of cryptographic information
US20080005034A1 (en) * 2006-06-09 2008-01-03 General Instrument Corporation Method and Apparatus for Efficient Use of Trusted Third Parties for Additional Content-Sharing Security
KR20080084046A (en) * 2007-03-14 2008-09-19 삼성전자주식회사 Method for conditional decoding content and apparatus therefor
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US8347098B2 (en) 2007-05-22 2013-01-01 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US9516364B2 (en) * 2010-03-29 2016-12-06 Google Technology Holdings LLC Secure transcoding of content
CN103139143B (en) * 2011-11-23 2016-03-30 北大方正集团有限公司 The method of digital copyright management, system and server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5673316A (en) * 1996-03-29 1997-09-30 International Business Machines Corporation Creation and distribution of cryptographic envelope
US5892900A (en) * 1996-08-30 1999-04-06 Intertrust Technologies Corp. Systems and methods for secure transaction management and electronic rights protection
US20010056539A1 (en) * 1996-12-04 2001-12-27 Dominique Vincent Pavlin Software protection device and method
US6226618B1 (en) * 1998-08-13 2001-05-01 International Business Machines Corporation Electronic content delivery system
US6675215B1 (en) * 2000-02-17 2004-01-06 Microsoft Corporation Automatic baud rate detection of null modem unimodem client connection
US20040260716A1 (en) * 2001-10-31 2004-12-23 Masataka Sugiura Content information transferring device and content information receiving device
US20070150917A1 (en) * 2003-05-28 2007-06-28 Fernandez Dennis S Network-extensible reconfigurable media appliance
US20060173783A1 (en) * 2005-01-26 2006-08-03 Marples David J System and method for authorized digital content distribution

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Ltd., O. M. (2004, 07 16). DRM Specification. Candidate Version 2.0. *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10417392B2 (en) 2006-05-03 2019-09-17 Apple Inc. Device-independent management of cryptographic information
US9311492B2 (en) 2007-05-22 2016-04-12 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US10574458B2 (en) 2007-05-22 2020-02-25 Apple Inc. Media storage structures for storing content, devices for using such structures, systems for distributing such structures
US20160073138A1 (en) * 2014-09-04 2016-03-10 Comcast Cable Communications, Llc User-Defined Content Streaming
US10390059B2 (en) * 2014-09-04 2019-08-20 Comcast Cable Communications, Llc Latent binding of content based on user preference

Also Published As

Publication number Publication date
US20190272513A1 (en) 2019-09-05
US20130067244A1 (en) 2013-03-14
KR20100040754A (en) 2010-04-20
JP2009512072A (en) 2009-03-19
CN101535987A (en) 2009-09-16
EP2528007A3 (en) 2013-07-10
US8306918B2 (en) 2012-11-06
AU2010201178A1 (en) 2010-04-15
CA2625360A1 (en) 2007-04-19
EP3118759B1 (en) 2020-07-08
JP2012099112A (en) 2012-05-24
JP5173007B2 (en) 2013-03-27
FR2956914B1 (en) 2018-03-09
EP2528007A2 (en) 2012-11-28
EP2528008B1 (en) 2016-08-24
EP2528008A2 (en) 2012-11-28
CA2715439A1 (en) 2007-04-19
KR20100040755A (en) 2010-04-20
US10296879B2 (en) 2019-05-21
CN101840484B (en) 2014-05-07
FR2956914A1 (en) 2011-09-02
CN101840484A (en) 2010-09-22
FR2891971B1 (en) 2011-07-29
EP3770778A1 (en) 2021-01-27
AU2010201178B2 (en) 2012-07-26
KR20080059436A (en) 2008-06-27
WO2007044825A3 (en) 2009-04-23
US11727376B2 (en) 2023-08-15
JP2010176684A (en) 2010-08-12
CN101535987B (en) 2013-03-13
JP2012069141A (en) 2012-04-05
AU2006302090A1 (en) 2007-04-19
EP2315151A3 (en) 2011-12-28
KR101192546B1 (en) 2012-10-17
CA2625360C (en) 2014-12-09
EP3118759A1 (en) 2017-01-18
FR2891971A1 (en) 2007-04-13
WO2007044825A2 (en) 2007-04-19
JP5156858B2 (en) 2013-03-06
EP2315151A2 (en) 2011-04-27
US20130073466A1 (en) 2013-03-21
CA2715439C (en) 2014-04-29
EP1777639A1 (en) 2007-04-25
AU2006302090B2 (en) 2012-07-26
KR101067566B1 (en) 2011-09-27
EP2528008A3 (en) 2013-07-24
JP4897901B2 (en) 2012-03-14
JP4897820B2 (en) 2012-03-14
EP2528007B1 (en) 2016-08-17
KR101067616B1 (en) 2011-09-27
US20070083473A1 (en) 2007-04-12

Similar Documents

Publication Publication Date Title
US11727376B2 (en) Use of media storage structure with multiple pieces of content in a content-distribution system
EP2466511B1 (en) Media storage structures for storing content and devices for using such structures
US9311492B2 (en) Media storage structures for storing content, devices for using such structures, systems for distributing such structures
AU2012227266B2 (en) Use of media storage structure with multiple pieces of content in a content-distribution system

Legal Events

Date Code Title Description
STPP Information on status: patent application and granting procedure in general

Free format text: NOTICE OF ALLOWANCE MAILED -- APPLICATION RECEIVED IN OFFICE OF PUBLICATIONS

STPP Information on status: patent application and granting procedure in general

Free format text: AWAITING TC RESP, ISSUE FEE PAYMENT VERIFIED

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE

MAFP Maintenance fee payment

Free format text: PAYMENT OF MAINTENANCE FEE, 4TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1551); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

Year of fee payment: 4